Virtual smart card to perform security-critical operations
First Claim
1. A method of enabling a virtual smart card, the method comprising:
- prompting the user for a unique identifier;
receiving the unique identifier based on user input;
initializing the virtual smart card in response to the received unique identifier;
reading data associated with the unique identifier via a reader device, wherein the data comprises a key stream of digital data bits associated with the unique identifier;
identifying a user'"'"'s smart card base address from a first portion of the digital data bits of the key stream; and
authenticating a user based on received unique identifier and results of the read data.
1 Assignment
0 Petitions
Accused Products
Abstract
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more specifically to limit the amount of information available to a potential defrauder, electronic components such as circuits, I/O, cryptographic, memory and dummy objects are built, modified or influenced on demand from physical characteristics of an eligible person or device. Digitized unique biometric or hardware identifiers are read upon start-up and runtime of the device and, in case of an eligible person or device, subsequently supply all values necessary for determination of the characteristics of the user specific virtual smart cards objects, their placement and connections. By multi-factor authentication, the end-user or device will retain sole control of its keys and use them for authentication, signature or encryption purposes as if he had a physical smart card in his hand.
30 Citations
20 Claims
-
1. A method of enabling a virtual smart card, the method comprising:
-
prompting the user for a unique identifier; receiving the unique identifier based on user input; initializing the virtual smart card in response to the received unique identifier; reading data associated with the unique identifier via a reader device, wherein the data comprises a key stream of digital data bits associated with the unique identifier; identifying a user'"'"'s smart card base address from a first portion of the digital data bits of the key stream; and authenticating a user based on received unique identifier and results of the read data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus configured to enable a virtual smart card, the apparatus comprising:
-
a transmitter configured to transmit a prompt to the user for a unique identifier; a receiver configured to receive the unique identifier based on user input; and a processor configured to initialize the virtual smart card in response to the received unique identifier, read data associated with the unique identifier via a reader device, wherein the data comprises a key stream of digital data bits associated with the unique identifier; identify a user'"'"'s smart card base address from a first portion of the digital data bits of the key stream; and authenticate a user based on received unique identifier and results of the read data. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to enable a virtual smart card, the processor being configured to perform:
-
prompting the user for a unique identifier; receiving the unique identifier based on user input; initializing the virtual smart card in response to the received unique identifier; reading data associated with the unique identifier via a reader device, wherein the data comprises a key stream of digital data bits associated with the unique identifier; identifying a user'"'"'s smart card base address from a portion of the digital data bits of the key stream; and authenticating a user based on received unique identifier and results of the read data. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification